Web platforms offer opportunity and risk

May 2009 Security Services & Risk Management

The introduction of Web 2.0 technologies into the mainstream market has resulted in a host of new opportunities for companies to save on technology expenditure by renting online applications and platforms to assist in running their businesses. However, with increasing opportunities come increased security threats.

“Not only do new Web platforms make it easier and cheaper to find and use applications that used to cost a small fortune in proprietary format, they also make it easier to create and host applications,” says Amir Lubashevsky, executive director of Magix Integration. “Today it is easy to make use of or offer any number of Web platforms from hosting locations anywhere in the world.

“Moreover, with open standards employed, companies can pick and choose applications from multiple providers to create a full suite of software solutions at a fraction of what it previously cost. Yet, while the applications are available at lower costs, it is irresponsible and a total aberration to corporate governance principles to simultaneously try to cut security spending.”

These small applications are often hosted by small and medium-sized businesses (SMBs), taking advantage of the Internet to gain customers from anywhere in the world. The problem is that while these SMBs are able to host and offer applications over the Internet, they are generally unable to provide an adequate security layer to protect users from the threats Web applications are prone to.

It is therefore crucial for users of these Web platforms to ensure they protect themselves. Using Web applications means customers are unaware who wrote the applications, who has access to the servers, who can edit the code and, possibly the most important issue, who has access to the your company’s details and data.

Most service providers offer some form of security, but only the largest are able to implement complete intrusion and malware detection and prevention systems due to the cost of these appliances. It is therefore up to the customers to take the necessary steps to ensure its systems and data are secure.

“While Web 2.0 opens the door to using truly global and cost-effective applications, it also opens the door for criminals who are able to exploit weakly secured technologies,” adds Lubashevsky. “Web applications are flexible, cheaper and more feature rich than traditional applications, but companies should only use them if they have ensured their IT security policies are geared for the openness and transparency of the Internet and all the threats contained therein.”

For more information contact Amir Lubashevsky, Magix Integration, +27 (0)11 258 4442, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Visualise and mitigate cyber risks
Security Services & Risk Management
SecurityHQ announced its risk and incident management capabilities for the SHQ response platform. The SHQ Response Platform acts as the emergency room, and the risk centre provides the wellness hub for all cyber security monitoring and actions.

Read more...
Eighty percent of fraud fighters expect to deploy GenAI by 2025
Security Services & Risk Management
A global survey of anti-fraud pros by the ACFE and SAS reveals incredible GenAI enthusiasm, according to the latest anti-fraud tech study by the Association of Certified Fraud Examiners (ACFE) and SAS, but past benchmarking studies suggest a more challenging reality.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...
Integrated information platform for risk management
Editor's Choice News & Events Security Services & Risk Management
Online Intelligence recently launched version 7 of its CiiMS risk and security platform. Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements in version 7.

Read more...
Global Identity Fraud Report revealing eight-month ‘mega-attack’
Editor's Choice Security Services & Risk Management
AU10TIX recently released its Q4 Global Identity Fraud Report, with the research identifying two never-before-seen attack patterns, with the worst case involving 22 000+ AI-generated variations of a single U.S. passport.

Read more...